A Method for User Data Protection Based on Game Theory in Cloud Computing
|
|
- Clarence Cross
- 6 years ago
- Views:
Transcription
1 , pp A Method for User Data Protection Based on Game Theory in Cloud Computing Xiaohui Li 1, Feng Liu 2, Hongxing Liang 3 1 College of Electrical and Information Engineer, Liaoning University of Technology Jinzhou, Liaoning, , China 2 Shenyang institute of computing technology, Chinese academy of sciences Shenyang, Liaoning, , China 3 Jinzhou Force, Jinzhou, Liaoning , China 1 lixiaohui@ s.bjut.edu.cn Abstract. To protect the security of user data and a safe, controlled service acquisition as the goal, we propose a game service acquisition method which combines trust evaluation with decision management application, designing user-centric data protection restraint mechanisms with mechanism design theory. The method includes user information, trust management, service discovery, service management and revenue information function module. Trust reconciles contradiction between user data protection and cloud services honest offering so that both sides of service reach the perfect Bayesian Nash equilibrium strategies to promote the honest service implementation. Keywords: cloud computing; game theory; data protection 1 Introduction Cloud computing environments due to their specific service delivery exist between cloud users and cloud services with data transfer of ownership, the separation of ownership and control of data, this competitive relationship with economic phenomena have similarities. Therefore, this paper attempts to use game theory and other related tools to solve the corresponding problem. In the cloud service interaction process, cloud users trust evaluation of cloud services, cloud users when faced with multiple service resources, it will be trusted to assess the behavior of their services, if the assessment of credibility, then choose to submit a request, otherwise select other services, empathy cloud services cloud users have to make trust assessments to ensure the safety of the service side, consider cloud from the perspective of the user data protection point of this program is mainly focused on cloud services cloud users trust management. We will interact with the service cloud computing environments as cloud game problems between users and cloud services, cloud services from the perspective of trust evaluation interaction, trust cloud services as a measure of the benefit or payment game party, demonstrate cloud cloud computing environment customer service requests and cloud services is a dynamic game of incomplete information. Game cloud service model proposed acquisition, the program to achieve cloud data ISSN: ASTL Copyright 2017 SERSC
2 security and user privacy protection as the goal, trust management focus, trust mechanisms by providing customized protection services on demand cloud users on this basis. Game theory is used to establish trust between cloud users and cloud services, trust services based on both the refined Bayesian Nash equilibrium strategies designed to promote service integrity cooperation incentives. The rest of this paper is organized as follows. In Section 2, we analysis Game relationship in the cloud environment and related information. In Section 3, we details the method design in two aspects: one is to design ideas and the other is specific program. We also give a specific module implementation for better illustration of our method. Finally, we conclude this paper in Section 4. 2 Cloud Service Game Analysis 2.1 Game Theory Game theory began in 1944 by Von Neumann and Oskar Morgenstern in cooperation with the publication of "Game Theory and Economic Behavior". Nash and Tucker in the 1950s, published an article on the definition and existence of equilibrium, and proposed a "prisoner's dilemma", both of which work laid the cornerstone of the noncooperative game theory [1-4]. Game theory is a problem with this decision and balanced decision-making body of behavioral research more interaction with each other, which emphasizes the interdependence of the parties to the policy decision-making Any one subject must determine their own optimal strategy considering other subjects on the basis of selection strategy. In this sense, game theory is also known as "game theory." Game theory is the essence of the subject must be considered the basis of other body reactions up to choose their own course of action, the results of the game is to produce a balanced, balanced combination of all people who participate in the optimal strategy or action. The main problem in game theory is the study participants with independent interests and rational basis, under certain rule conditions, predict the behavior of other participants and the results of their behavior types (such as cooperation, betrayal, etc.) obtained by comparing, and then decide what action strategies, and ultimately achieve an equilibrium solution of mutual restraint. 2.2 Mechanism Design Theory Mechanism design theory study under freedom of choice, the conditions of incomplete information, design a theoretical mechanism to achieve the objectives set, which can be seen as the integrated use of game theory and social choice theory. In other word, the mechanism designs to provide an incentive to choose their own private information members of society problem analytical framework to consider what kind of game in the form of construction, making the solution of this game is that social Copyright 2017 SERSC 17
3 goals. Social goals here refers to the selection result of the entire social groups, by the players choice by expressing their preferences concluded that the results will in turn affect the choice of each individual players, if the result is a society of social choice result set, places Multi-functions social choice rule indicates [5-8]. 2.3 Dynamic Service Game Analysis Cloud computing is a huge cloud service network composed by a parallel grid, computing power through virtualization technology extension service cloud. Front-end user interface permits the user to select the service through the service catalog, service request and after verification by the system manager to find alternative service resources to select a service in the cloud resource is then provided by the service tool [9]. Cloud computing system logical structure shown in Figure 1. In the cloud computing service interaction environments, from between the cloud user data security and privacy protection angle cloud users and cloud services there are different interests and needs: Cloud user as a cloud service requester, choose a trusted service provider, protection while their rights to obtain services revenue; cloud services as a service provider is to provide the amount of its income. Both hope to eventually achieve a balanced state of mutual restraint results in providing information and services to get the room, so the interactive services cloud computing environment is the behavior of both sides of the game.... User interface System Management Monitoring and Statistics Services Directory Fig. 1. Cloud computing system logical structure 3. Method Design In a cloud computing environment cloud user data protection security program primarily consists of two parts: the trust evaluation and trust-based decision management. The main job is to assess the safety of trust from the cloud services provided to de- 18 Copyright 2017 SERSC
4 scribe the relationship and trust quantify cloud computing environment of trust; Decision management mainly work is service options based on trust, including service discovery, selection and delivery of user data with trusted cloud balance relationship between the user and the service to obtain the release of data for controllable cloud services. To protect the security of user data cloud to cloud services provide a safe and controlled as the goal, the trust portfolio assessment and decision management application, designed to promote the application of mechanism design theory for data protection in the cloud user restraint mechanism center. 3.1 Design Ideas In the course of cloud computing environments in interactive services, cloud users what kind of approach allows to provide a safe and reliable cloud services, safety and security of user data is the core problem. Cloud users as a resource owner, cloud services as a controller of resources, in this sense we principal economics - agent theory to analyze the interaction occurring in the course of service problems and solutions, problems include interest conflict and asymmetric information.trust in the cloudbased service acquisition for analysis, used to calculate the credibility and trust cloud services directly belong to the history of trust and other information prior information on cloud services cloud user feedback evaluation belong posteriori information. trust based service interaction Game process as shown in Figure 2: Cloud services directly trust Cloud Services recommendation trust Priori information Cloud Services Trust quantification Service Discovery Dynamic Decision Correction of Information Service Selection Service behavior feedback Posteriori information Fig. 2. Service selection game information based on trust 3.2 Cloud Users Data Protection Method based on Game In a cloud computing environment to the cloud computing user demand for services - safe and controlled as a starting point, to trust the main line, the introduction of the Copyright 2017 SERSC 19
5 game and restraint mechanisms proposed cloud user data protection solutions. The scenario in the game under restraint mechanism, so that the integrity of the service provider to implement cloud services, through the cloud service node trust evaluation, both for service interaction and user security decisions to provide more detailed and accurate basis. (1) Information Management: including a priori and a posteriori information management information, feedback and historical behavior is mainly historical service management cloud services provide statistical and other information, is updated via the information corrected cloud user services provide the basis for selection; (2) Service Trust Evaluation: First cloud users describe the service description trust, trust quantification of cloud services based on a priori information; (3) Service selection: trust-based service discovery and service selection, as a cloud user's final earnings; (4) User Data Delivery: User data disclosure mode based on trust, the introduction of trust threshold concept triggering cloud service constraints and incentives. (5) Cloud User Decision Management: service selection and user data delivery, in the process of service game interative, cloud users according to Decision Management make the choice of trust threshold and trust management results to deliver data, triggering cloud services restraint mechanism, dynamic management service trust value. In a cloud computing environment, there are between cloud users interact with cloud services over the game, after the process may never again their choice, called the basic game, if we choose the cloud service is called repeated games, repeated games behavior and results are not necessarily duplicate the basic game is simple, because the information side of the game will return information changes, so that the choice game behavior is affected. In repeated games, if fraud occurs, the game process will thus loss of revenue, so participants must fully consider the long-term benefits, rather than choose immediate. In this case, the two sides will conduct cooperation agreement on the formation of constraints. In repeated games, punishment mechanism is often used to trigger strategies, both players find each other once the first tentative cooperation fraudulent or malicious behavior, you are no longer together. Therefore, according to the punishment trigger strategies can contribute to long-term choice between nodes acts to maintain the integrity of the biggest benefits of cooperation. Cloud services are the actors, it is a rational choice of strategy, seeking to maximize returns. Compliance triggering policy, when a malicious service provider, the cooperation will always terminate that application posteriori information feedback, correction of the assessed value of the trust cloud services or increase their choice of trust threshold. Since the cloud user is the later actor in the game, for the cloud service request, based on a priori information needed for cloud services, authorization or refusal to make choices. If the cloud is the first choice of the service user, assuming a priori information is directly assess the value of the trust, the application of trust evaluation methods to assess the value of the service provider trust T [0,1], and when trust of its assessed valuet, cloud users to take selection strategy, otherwise refused; where [0,1] is the setting for cloud services are chosen to trust threshold. If the cloud service is already offered in good faith through service, then do not have to trust 20 Copyright 2017 SERSC
6 this assessment, direct selection, until after the implementation of non-faith service cloud service providers, will never accept their services. Cloud service is the pioneer in the game, it is a rational choice of strategy, seeking to maximize returns. Compliance triggering policy, after a malicious service providing, the cooperation will always terminate that application posteriori information feedback, correction cloud services assessed trust value T 0 or increase trust threshold For cloud services can provide honest service design constraint mechanism is as follows: If a malicious cloud service providers, cloud users will never get the choice to apply; cloud service is honest while providing services, applications, representing because of this honest service offer, the next time its earnings increasing. Dishonest service offered payoff: 1. S f Honest service offered payoff: (0,1] S _ Income S _ Income (1) d S c = S _ Income 1 When Sc Sf the honest cloud service provider will get more benefit. (2) ( Sd _ Income 2 S _ Income) ( S _ Income S _ Income) d (3) 4 Conclusion In this paper, we focus on user data protection issues in cloud computing, propose a Game based method to data protection, while dynamically generate trust relationship to release its own data to achieve balance of privacy protection and services provided,in which we define trust metrics as a dynamic and flexible process that offers a new perspective for decision-making. Firstly,from the perspective of game theory,we describe the interactive of a cloud services and cloud between users as behavior game, trust and decision-making (service selection) is important information for both games. Applying game constraints, incentives both to implement credible behavior. Then to introduce the various components of the method and give examples of partially implemented method. The analysis shows that the performance of our method is obvious and it can apply to cloud computing environment based on trust services acquisition and has guidance for cloud users to select specific service to achieve less privacy loss and more benefits. That high fraud costs make the services and users both sides to implementation faith conduct. This game method can effectively protect users' data and containment malicious service side, from another point of view, it is also beneficial to the security of the service side. Copyright 2017 SERSC 21
7 Acknowledgments The work in this paper has been supported by Liaoning Province Science and Technology Program (SY ). References 1. Deyi Li, Things cornerstone - Cloud Computing [J],Technology tide,2011, 5: ACM SIGCOMM Computer Communication Review, Volume 39, Number 1,2009, pp G. Owen, Game theory, Naval Postgraduate School: Monterey, California, S. Roy et al., A Survey of Game Theory as Applied to Network Security, in Proceedings of the 43rd Hawaii International Conference on System Sciences, pp. 1-10, I. K. Geckil and P. L. Anderson. Applied Game Theory and Strategic Behavior, Chapman & Hall/CRC Press, Yarui Chen,Liqin Tian.Cloud computing model and analysis based on user behavior under dynamic environment Game Theory [J], Journal of Electronic, 2011,39(8): Zhangsheng Bing, Cai Wandong, Li Yongjun. Social network access control method based on game theory [J], Northwestern Polytechnical University,2011,29(4): Tianli Qin, Lin Chuang. Trusted Network in an act of trust-based predictive control mechanisms Game [J], Journal of Computers,2007,30(11): Kuang Sheng Hui, Li Bo cloud computing architecture and application examples analysis [J], Computer and Digital Engineering, Zhang Qiang, Liu Qiang, linear assignment method to improve and Bernardo Study [J]. Industrial Engineering and Management,2009,(1): Xiaohui Li, Jingsha He, Ting Zhang. A service-oriented identity authentication privacy protection method in cloud computing. International Journal of Grid and Distributed Computing, 2013, 6(1): Copyright 2017 SERSC
Using Game Theory to analyze Risk to Privacy. Lisa Rajbhandari Einar A. Snekkenes
Using Game Theory to analyze Risk to Privacy Lisa Rajbhandari Einar A. Snekkenes Agenda Introduction Background Issues focused on this paper Why Game Theory? A privacy scenario Limitations Conclusion 2
More informationRecommendation-based trust model in P2P network environment
Recommendation-based trust model in P2P network environment Yueju Lei, Guangxi Chen (Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology, Guilin 541004, China) chgx@guet.edu.cn,
More informationChapter 15 Oligopoly
Goldwasser AP Microeconomics Chapter 15 Oligopoly BEFORE YOU READ THE CHAPTER Summary This chapter explores oligopoly, a market structure characterized by a few firms producing a product that mayor may
More informationOligopolies Part III
Oligopolies Part III It's called an oligopoly. It's not a regular market. It's a market in which they control the prices and they've been doing it for years. Richard Miller The Prisoner s Dilemma Consider
More informationModeling the Personal Data Ecosystem: Business and Policy Scenarios ID3. (C) John H.. Clippinger
Modeling the Personal Data Ecosystem: Business and Policy Scenarios ID3 (C) John H.. Clippinger A WEF View of Personal Data Personal Data Ecosystem Marketers Banks DATA USERS Media Affiliates Information
More informationPrinciples of Microeconomics Assignment 8 (Chapter 10) Answer Sheet. Class Day/Time
1 Principles of Microeconomics Assignment 8 (Chapter 10) Answer Sheet Name Class Day/Time Questions of this homework are in the next few pages. Please find the answer of the questions and fill in the blanks
More informationKEY SUCCESS FACTORS FOR MAJOR PROGRAMS THAT LEVERAGE IT. The 7-S for Success Framework
KEY SUCCESS FACTORS FOR MAJOR PROGRAMS THAT LEVERAGE IT The 7-S for Success Framework May 2014 This document sets forth a framework of critical success factors for large scale government IT projects. ACT-IAC
More informationMicroeconomics LESSON 6 ACTIVITY 40
Microeconomics LESSON 6 ACTIVITY 40 Monopolistic Competition Figure 40.1 Monopolistically Competitive Firm in the Short Run MC COSTS/REVENUE (DOLLARS) E D C B A F H K G ATC D 0 MR L M QUANTITY 1. Use Figure
More informationResearch on e-commerce logistics system informationization in Chain
Available online at www.sciencedirect.com ScienceDirect Procedia - Social and Behavioral Scien ce s 96 ( 2013 ) 838 843 13th COTA International Conference of Transportation Professionals (CICTP 2013) Research
More informationStudy on Predictive Maintenance Strategy
, pp.52-56 http://dx.doi.org/10.14257/astl.2016.137.10 Study on Predictive Maintenance Strategy Wang Hongxia, Ye Xiaohui, Yin Ming Naval University of Engineering, Wuhan 430033, China 25523224@QQ.com Abstract.
More informationMicroeconomics LESSON 6 ACTIVITY 41
Microeconomics LESSON 6 ACTIVITY 41 Game Theory Strategic thinking is the art of outdoing an adversary, knowing that the adversary is trying to do the same to you. Dixit and Nalebuff Game theory is used
More informationHow Open Source Communities to do Standardization
www.huawei.com How Open Source Communities to do Standardization Li Li (Thomas), thomas.lili@huawei.com VP of Standardization & Industry For LinuxCon + ContainerCon + CloudOpen China, 19-20 June 2017,
More informationResearch and Application Study on Accident-Based 3D Power Station Simulation Technology
International Conference on Electromechanical Control Technology and Transportation (ICECTT 2015) Research and Application Study on Accident-Based 3D Power Station Simulation Technology Tie Li, Xiaoming
More informationChapter 9: Static Games and Cournot Competition
Chapter 9: Static Games and Cournot Competition Learning Objectives: Students should learn to:. The student will understand the ideas of strategic interdependence and reasoning strategically and be able
More informationResearch on Investment, Financing and Financial Management of Small and Medium-sized Enterprises Jiafeng Wan
2nd International Conference on Education, Management and Information Technology (ICEMIT 2015) Research on Investment, Financing and Financial Management of Small and Medium-sized Enterprises Jiafeng Wan
More informationChapter 13 Outline. Challenge: Intel and AMD s Advertising Strategies. An Overview of Game Theory. An Overview of Game Theory
Chapter 13 Game Theory A camper awakens to the growl of a hungry bear and sees his friend putting on a pair of running shoes. You can t outrun a bear, scoffs the camper. His friend coolly replies, I don
More informationA Finance Logistics Management Platform Based on Collaboration Management
, pp.37-41 http://dx.doi.org/10.14257/astl.2014.48.07 A Finance Logistics Management Platform Based on ZhongDai Wu 1, MingHai Ye 1, Mei Li 1, Jin Liu 2 1. School of Economics Management, Tongji University,
More informationMcKinsey BPR Approach
McKinsey BPR Approach Kai A. Simon Viktora Institute 1General aspects Also McKinsey uses a set of basic guiding principles, or prerequisites, which must be satisfied in order to achieve reengineering success.
More informationThe Game Analysis about Government-Industry-University-Institute Alliance of Competitive Intelligence
International Journal of Business and Social Science Vol. 5, No. 7; June 2014 The Game Analysis about Government-Industry-University-Institute Alliance of Competitive Intelligence Tingting Dai Shanghai
More informationA More Intelligent Network Sharing More Intelligent Information
A More Intelligent Network Sharing More Intelligent Information 1. Introduction: The Department of Defense is more dependent on information sharing than ever before. Distributed decision-making is the
More information5 Market Games For Teaching Economics
5 Market Games For Teaching Economics Progression 5 Market Games from website economics-games.com To be played separately or as a sequence: Market Game 1: Sunk costs, monopoly, and introduction to the
More informationAQA Economics A-level
AQA Economics A-level Microeconomics Topic 5: Perfect Competition, Imperfectly Competitive Markets and Monopoly 5.5 Oligopoly Notes Characteristics of an oligopoly: High barriers to entry and exit There
More informationStrategies to Improve the Efficiency of Chinese Agricultural Products Circulation
International Conference on Economic Management and Trade Cooperation (EMTC 2014) Strategies to Improve the Efficiency of Chinese Agricultural Products Circulation De-Shu KONG 1,2,a, Cheng-Bo HU 3,b,*
More informationOligopoly Pricing. EC 202 Lecture IV. Francesco Nava. January London School of Economics. Nava (LSE) EC 202 Lecture IV Jan / 13
Oligopoly Pricing EC 202 Lecture IV Francesco Nava London School of Economics January 2011 Nava (LSE) EC 202 Lecture IV Jan 2011 1 / 13 Summary The models of competition presented in MT explored the consequences
More informationOligopoly is a market structure in which Natural or legal barriers prevent the entry of new firms. A small number of firms compete.
CHAPTER 15: OLIGOPOLY What Is Oligopoly? Oligopoly is a market structure in which Natural or legal barriers prevent the entry of new firms. A small number of firms compete. Barriers to Entry Either natural
More informationCourse Outline. Business Undeclared School of Business & Economics ECON Applied Microeconomics for Sustainable Management
Course Outline Calendar Description Business Undeclared School of Business & Economics ECON 6020-3.00 Applied Microeconomics for Sustainable Management Students examine more advanced microeconomic tools
More informationThe Research of Middleware Architecture of Intelligent Logistics System Based on SOA
American Journal of Software Engineering and Applications 2015; 4(6): 115-120 Published online October 23, 2015 (http://www.sciencepublishinggroup.com/j/ajsea) doi: 10.11648/j.ajsea.20150406.13 ISSN: 2327-2473
More informationMicrogrid Modelling and Analysis Using Game Theory Methods
Microgrid Modelling and Analysis Using Game Theory Methods Petros Aristidou, Aris Dimeas, and Nikos Hatziargyriou School of Electrical and Computer Engineering National Technical University of Athens Zografou
More informationFOUR MARKET MODELS. Characteristics of Oligopolies:
FOUR MARKET MODELS Perfect Competition Monopolistic Competition Oligopoly Pure Monopoly Characteristics of Oligopolies: A Few Large Producers (Less than 10) Identical or Differentiated Products High Barriers
More informationGame Theory Methods in Microgrids
Game Theory Methods in Microgrids Petros Aristidou, Aris Dimeas, and Nikos Hatziargyriou School of Electrical and Computer Engineering National Technical University of Athens Zografou Campus 15780 Athens
More informationChapter 13. Game Theory. Gaming and Strategic Decisions. Noncooperative v. Cooperative Games
Chapter 13 Game Theory Gaming and Strategic Decisions Game theory tries to determine optimal strategy for each player Strategy is a rule or plan of action for playing the game Optimal strategy for a player
More informationUse the following to answer question 4:
Homework Chapter 11: Name: Due Date: Wednesday, December 4 at the beginning of class. Please mark your answers on a Scantron. It is late if your Scantron is not complete when I ask for it at 9:35. Get
More informationAnalytic Preliminaries for Social Acceptability of Legal Norms &
Analytic Preliminaries for Social Acceptability of John Asker February 7, 2013 Yale Law School Roadmap Build on case studies of environments where extra-legal norms are at least as important as formal
More informationPARTNERSHIP MARKETING: A NEW APPROACH TO ENSURE SUSTAINABILITY IN A DIGITAL LIBRARY by Hilda Kriel
1 PARTNERSHIP MARKETING: A NEW APPROACH TO ENSURE SUSTAINABILITY IN A DIGITAL LIBRARY by Hilda Kriel 1. INTRODUCTION Sustainability is one of the biggest challenges facing libraries in the digital era.
More informationGame theory (Sections )
Game theory (Sections 17.5-17.6) Game theory Game theory deals with systems of interacting agents where the outcome for an agent depends on the actions of all the other agents Applied in sociology, politics,
More informationResearch on the Influence of WOM on Consumer Decisions
, pp.217-223 http://dx.doi.org/10.14257/astl.2015.111.42 Research on the Influence of WOM on Consumer Decisions Fei Meng 1, Jianliang Wei 2, Qinghua Zhu 3 1 Department of Public Foundation, Zhejiang Police
More informationAMR Data Hub. Architecture. Work Package 6.1.5: Enterprise Application Implementation Scenarios for Electricity Market
AMR Data Hub Architecture Work Package 6.1.5: Enterprise Application Implementation Scenarios for Electricity Market This work was carried out in the Smart Grids and Energy Markets (SGEM) research program
More informationReputation-based trust management systems and their applicability to grids
Reputation-based trust management systems and their applicability to grids Gheorghe Cosmin Silaghi 1, Alvaro E. Arenas 1, Luis Moura Silva 2 1 {g.c.silaghi, a.e.arenas}@rl.ac.uk CCLRC, Rutherford Appleton
More informationGenetic Algorithms-Based Model for Multi-Project Human Resource Allocation
Genetic Algorithms-Based Model for Multi-Project Human Resource Allocation Abstract Jing Ai Shijiazhuang University of Applied Technology, Shijiazhuang 050081, China With the constant development of computer
More informationProblems and Prospects of CSR System Development in China
Problems and Prospects of CSR System Development in China Jie Wang Zhuhai Campus, Beijing Institute of Technology 6 Jin Feng Road, Tang Jia Wan, Zhuhai 519085, China & School of Management, Dalian Polytechnic
More informationGames and Strategic Behavior. Chapter 9. McGraw-Hill/Irwin. Copyright 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
Games and Strategic Behavior Chapter 9 McGraw-Hill/Irwin Copyright 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Learning Objectives 1. List the three basic elements of a game. Recognize
More informationThe Antecedents and Consequences of Customer Trust and Website Image: The Moderating Effects of Gender
, pp.29-33 http://dx.doi.org/10.14257/astl.2015.102.07 The Antecedents and Consequences of Customer Trust and Website Image: The Moderating Effects of Gender Ki Han Chung 1, Yan Qing Zhang 2, Yu Hui Dong
More informationA Reliable Trust Model for Grid Based on Reputation
A Reliable Trust Model for Grid Based on Reputation Vivekananth.p Lecturer-IT Department St Joseph College of Engineering and Technology Dar-Es-Salaam, Tanzania vivek.jubilant@gmail.com Abstract- Grid
More informationHow will you manage the impact of the Payment Services Directive 2?
How will you manage the impact of the Payment Services Directive 2? By Edwin van der Molen, Michal Kalina, Bert Bouwmeester and Bernard Juffermans April 2017 What is your strategy? The topic of this white
More informationprofitability in business systems BSS consolidation and harmonization Your business technologists. Powering progress
profitability in business systems BSS consolidation and harmonization Your business technologists. Powering progress Value Through Efficiency After years of technology innovation and IP transformation,
More informationThe Optimal Decisions of the Company + Farmer Contract-Farming Supply Chain With Nash Bargain Fair Reference
Management Science and ngineering Vol. 1, No. 1, 16, pp. 8-13 DOI:1.3968/813 ISSN 1913-341 [Print] ISSN 1913-35X [Online] www.cscanada.net www.cscanada.org The Optimal Decisions of the Company + armer
More informationECON December 4, 2008 Exam 3
Name Portion of ID# Multiple Choice: Identify the letter of the choice that best completes the statement or answers the question. 1. A fundamental source of monopoly market power arises from a. perfectly
More informationericsson White paper GFMC-17: Uen October 2017 TELECOM IT FOR THE DIGITAL ECONOMY
ericsson White paper GFMC-17:000619 Uen October 2017 TELECOM IT FOR THE DIGITAL ECONOMY Introduction The rapidly expanding digital economy has exposed a clear gap in both the architecture and operational
More informationTalent Education Path Under "One Belt and One Road" Horizon. Lin Zhang
International Conference on Education, Sports, Arts and Management Engineering (ICESAME 2016) Talent Education Path Under "One Belt and One Road" Horizon Lin Zhang Guangzhou Sports Polytechnic, Guangzhou
More informationReliability Analysis of the Railway Time Synchronization Network Based on Bayesian
, pp.59-72 http://dx.doi.org/10.14257/ijca.2015.8.10.06 Reliability Analysis of the Railway Time Synchronization Network Based on Bayesian Youpeng Zhang, Feng Wang, Shan Zhang and Li Lan School of Automation
More informationA Game Theoretic Analysis of Blacklisting in Online Data Storage Systems
A Game Theoretic Analysis of Blacklisting in Online Data Storage Systems Bader Ali School of Computer Science McGill University Montreal, QC H3A 2A7, Canada Email: bali2@cs.mcgill.ca Muthucumaru Maheswaran
More information14.01 Principles of Microeconomics, Fall 2007 Chia-Hui Chen November 7, Lecture 22
Monopoly. Principles of Microeconomics, Fall Chia-Hui Chen November, Lecture Monopoly Outline. Chap : Monopoly. Chap : Shift in Demand and Effect of Tax Monopoly The monopolist is the single supply-side
More informationAP Microeconomics Review Session #3 Key Terms & Concepts
The Firm, Profit, and the Costs of Production 1. Explicit vs. implicit costs 2. Short-run vs. long-run decisions 3. Fixed inputs vs. variable inputs 4. Short-run production measures: be able to calculate/graph
More informationPRICE OF ANARCHY: QUANTIFYING THE INEFFICIENCY OF EQUILIBRIA. Zongxu Mu
PRICE OF ANARCHY: QUANTIFYING THE INEFFICIENCY OF EQUILIBRIA Zongxu Mu The Invisible Hand Equilibria and Efficiency Central to free market economics The Wealth of Nations (Smith, 1776) led by an invisible
More informationBLOCKCHAIN CLOUD SERVICE. Integrate Your Business Network with the Blockchain Platform
BLOCKCHAIN CLOUD SERVICE Your Business Network with the Blockchain Platform Enable real-time transactions and securely share tamper-proof data across a trusted business network. Oracle Blockchain Cloud
More informationThe Influential Factors of Organization Adoption of Egovernment Cloud
2017 International Conference on Financial Management, Education and Social Science (FMESS 2017) The Influential Factors of Organization Adoption of Egovernment Cloud Wei Wang1, 3, a, Yiming Liu1, 3, b,
More informationRegional Collaborative Environmental Governance in Yangtze
Brief for GSDR 2016 Update Regional Collaborative Environmental Governance in Yangtze River Delta, China Qinqi Dai, Yu Yang*, Department of Public Administration, Southeast University, Nanjing 210096,
More informationService Identification: BPM and SOA Handshake
Service Identification: Srikanth Inaganti & Gopala Krishna Behara Abstract Service identification is one of the first steps in the Service Oriented Development life cycle. This has been challenging to
More informationApplication of BIM Based on Security in the Process of Engineering Construction
Application of BIM Based on Security in the Process of Engineering Construction Weidong Wu, Chuxuan Ren, Yuhong Wang School of Civil Engineering and Architecture, SWPU, China Abstract In recent years,
More informationEnterprise IT application evaluation based on BP neural network in Tianjin city
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2013, 5(12):108-112 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Enterprise IT application evaluation based on BP
More informationCMSC 474, Introduction to Game Theory Analyzing Normal-Form Games
CMSC 474, Introduction to Game Theory Analyzing Normal-Form Games Mohammad T. Hajiaghayi University of Maryland Some Comments about Normal-Form Games Only two kinds of strategies in the normal-form game
More informationChanges of Clothing Distribution Logistics Management RFID Technology
Science Journal of Business and Management 2016; 4(3): 72-76 http://www.sciencepublishinggroup.com/j/sjbm doi: 10.11648/j.sjbm.20160403.12 ISSN: 2331-0626 (Print); ISSN: 2331-0634 (Online) Changes of Clothing
More informationSynergies between Risk Modeling and Customer Analytics
Synergies between Risk Modeling and Customer Analytics EY SAS Forum, Stockholm 18 September 2014 Lena Mörk and Ramona Klein Agenda 1 2 Introduction Modeling in the financial sector 3 4 5 Consequences from
More informationEnterprise Architecture: an ideal discipline for use in Supply Chain Management
Enterprise Architecture: an ideal discipline for use in Supply Chain Management Richard Freggi Senior Supply Chain Architect (TOGAF 9.1 certified level 2) HP Inc. Content Understanding Supply Chain Management
More informationCA Clarity Project & Portfolio Manager
CA Clarity Project & Portfolio Manager Business Objects Universes for CA Clarity PPM Reference Guide v12.1.0 This documentation and any related computer software help programs (hereinafter referred to
More informationImproved Risk Management via Data Quality Improvement
Improved Risk Management via Data Quality Improvement Prepared by: David Loshin Knowledge Integrity, Inc. January, 2011 Sponsored by: 2011 Knowledge Integrity, Inc. 1 Introduction All too frequently, we
More information( %)'* + 7# (&)*)')%&&+)*)-.)/##############################################################!
"$%&'% ( %)'* + " $%&'(&)*)')%&&+), " (&)*)')%&&+)(&-( "" (&)*)')%&&+)*)-.)/0 " (&)*)')%&&+)*)-.)/$1 + '%, - "%&&%. 0 /(.(.&%(&)*)'23-(&%2-+()'4 0 &%5&((&)*)'()-(/(&4 / 0$%'% 1 -+'(.-(6.(/(&6&-((26&3&-/*6/(&,
More informationIT. 1. Carry out trouble-shooting strategies for resolving an identified end-user IT problem.
ACM CCECC Serving computing education communities since 1991. Information Technology Metrics IT. 1. Carry out trouble-shooting strategies for resolving an identified end-user IT problem. Lists appropriate
More informationPrinciples of Economics: Seminar 1 - Game Theory
Principles of Economics: Seminar 1 - Game Theory July 18, 2017 Principles of Economics: Seminar 1 - Game Theory July 18, 2017 1 / 20 What is a game? Definition: A game is any situation involving two or
More informationResearch on Regional Logistics Industry Development Strategy Based on System Dynamics: Take Changzhou as a Case
3rd International Conference on Management Science and Management Innovation (MSMI 2016) Research on Regional Logistics Industry Development Strategy Based on System Dynamics: Take Changzhou as a Case
More informationWhy Roadmapping Software is Key to New Product Innovation Success
Why Roadmapping Software is Key to New Product Innovation Success For decades the linear innovation model reigned supreme. New product ideas began in the R&D realm, which fed into development, then production,
More informationRisk analysis in performancebased regulation (PBR) of safety
Risk analysis in performancebased regulation (PBR) of safety Tony Cox April 14, 2016 1 Why PBR? PBR seeks to improve future outcomes by setting goals rather than by prescribing how to achieve them Emphasizes
More informationAustralia and New Zealand Testing Board. Testing as a Service. Carol Cornelius ANZTB Capital Quality Consulting
Testing as a Service TaaS Carol Cornelius ANZTB Capital Quality Consulting Testing as a Service - Forrester Sourcing professionals are moving away from their historic emphasis on staff augmentation in
More informationExtra Credit. Student:
Extra Credit Student: 1. A glass company making windows for houses also makes windows for other things (cars, boats, planes, etc.). We would expect its supply curve for house windows to be: A. Dependent
More informationArchitecture-led Incremental System Assurance (ALISA) Demonstration
Architecture-led Incremental System Assurance (ALISA) Demonstration Peter Feiler Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 [DISTRIBUTION STATEMENT A] This material
More informationDesign and Implementation of Underground Mining Safety Production Management System
, pp.173-180 http://dx.doi.org/10.14257/ijsia.2013.7.6.18 Design and Implementation of Underground Mining Production Management System Jun Luo Civil and Environmental Engineering School, University of
More informationLaboratory Management Based on Internet of Things. Jianming Huang
Advanced Materials Research Online: 2013-06-27 ISSN: 1662-8985, Vol. 711, pp 665-669 doi:10.4028/www.scientific.net/amr.711.665 2013 Trans Tech Publications, Switzerland Laboratory Management Based on
More informationPreface. Chapter 1 Basic Tools Used in Understanding Microeconomics. 1.1 Economic Models
Preface Chapter 1 Basic Tools Used in Understanding Microeconomics 1.1 Economic Models 1.1.1 Positive and Normative Analysis 1.1.2 The Market Economy Model 1.1.3 Types of Economic Problems 1.2 Mathematics
More informationSocial Networking Goes Mobile
WHITEPAPER Social Networking Goes Mobile This whitepaper is an extract from: Mobile User Generated Content Dating, Social Networking & Personal Content Delivery 2008-2013 (Second Edition)... information
More information#1: Monopolistic Competition
Answers: #1: Monopolistic Competition MC-1. d. All of the terms describe economically breaking even MC-2. c. Economic profits will attract competition MC-3. d. Economically breaking even means you just
More informationOptimization Design of Cold Roll-beating Experiment Device Based on ANSYS Workbench
, pp.125-130 http://dx.doi.org/10.14257/astl.2016. Optimization Design of Cold Roll-beating Experiment Device Based on ANSYS Workbench Fanzhi Wei, Mingshun Yang, Qilong Yuan Faculty of mechanical and precision
More informationThe effects of carbon taxes on investments in Smart-Grids and consumer engagement
DEPARTMENT OF ECONOMICS, MANAGEMENT AND QUANTITATIVE METHODS The effects of carbon taxes on investments in Smart-Grids and consumer engagement E.C. Ricci 15 th Global Conference on Environmental Taxation
More informationModeling of competition in revenue management Petr Fiala 1
Modeling of competition in revenue management Petr Fiala 1 Abstract. Revenue management (RM) is the art and science of predicting consumer behavior and optimizing price and product availability to maximize
More informationACHIEVE BUSINESS SUCCESS WITH ACCURATE SOFTWARE PLANNING
ACHIEVE BUSINESS SUCCESS WITH ACCURATE SOFTWARE PLANNING SOFTWARE DEVELOPMENT ESTIMATION STRATEGIES Manage risk and expectations within your organization with credible, defensible estimates. Learn how
More informationExperiential Learning Through Classroom Experiments David Bowes, Southeastern Louisiana University Jay Johnson, Southeastern Louisiana University
Experiential Learning Through Classroom Experiments David Bowes, Southeastern Louisiana University Jay Johnson, Southeastern Louisiana University ABSTRACT This paper describes classroom experiments in
More informationEdexcel (A) Economics A-level
Edexcel (A) Economics A-level Theme 3: Business Behaviour & the Labour Market 3.4 Market Structures 3.4.4 Oligopoly Notes Characteristics of an oligopoly: High barriers to entry and exit There are high
More informationNCOVER. ROI Analysis for. Using NCover. NCover P.O. Box 9298 Greenville, SC T F
NCOVER ROI Analysis for Test Coverage Using NCover NCover P.O. Box 9298 Greenville, SC 29601 T 864.990.3717 F 864.341.8312 conversation@ncover.com www.ncover.com Table of Contents Executive Summary 2 Cost
More informationOperational Modeling: Informed solutions for complex problems
Operational Modeling: Informed solutions for complex problems 16 th LCI Congress October 7-10, 2014 Our Big Idea Adapting standard practices from the semiconductor industry enables new techniques in design
More informationBest-response functions, best-response curves. Strategic substitutes, strategic complements. Quantity competition, price competition
Strategic Competition: An overview The economics of industry studying activities within an industry. Basic concepts from game theory Competition in the short run Best-response functions, best-response
More informationBuilding a Winning Business Case for HCM SaaS
Building a Winning Business Case for HCM SaaS Mark Bray, Principal Consultant ISG WHITE PAPER 2016 Information Services Group, Inc. All Rights Reserved INTRODUCTION The number of enterprises that experience
More informationSAMPLE MULTIPLE CHOICE FINAL EXAM CHAPTER 6 THE ANALYSIS OF COSTS
1. SAMPLE MULTIPLE CHOICE FINAL EXAM CHAPTER 6 THE ANALYSIS OF COSTS Long-run average cost equals long-run marginal cost whenever a) the production function exhibits constant returns to scale. b) fixed
More informationAPPROACHING GREEN MANUFACTURING IN IRON AND STEEL INDUSTRY
Int. J. Mech. Eng. & Rob. Res. 2013 Md. Salman Alvi et al., 2013 Review Article ISSN 2278 0149 www.ijmerr.com Vol. 2, No. 3, July 2013 2013 IJMERR. All Rights Reserved APPROACHING GREEN MANUFACTURING IN
More informationRevenue Models for Demand Side Platforms in Real Time Bidding Advertising
27 IEEE International Conference on Systems Man Cybernetics (SMC Banff Center Banff Canada October 5-8 27 Models for Dem Side Platforms in Real Time Bidding Advertising Rui Qin Xiaochun Ni Yong Yuan Juanjuan
More informationITIL Intermediate Lifecycle Stream:
ITIL Intermediate Lifecycle Stream: SERVICE TRANSITION CERTIFICATE Sample Paper 2, version 6.1 Gradient Style, Complex Multiple Choice QUESTION BOOKLET Gradient Style Multiple Choice 90 minute paper Eight
More informationTechNavio Infiniti Research
TechNavio Infiniti Research http://www.marketresearch.com/infiniti Research Limited v2680/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday:
More informationModeling of Agile Intelligent Manufacturing-oriented Production Scheduling System
International Journal of Automation and Computing 7(4), November 2010, 596-602 DOI: 10.1007/s11633-010-0545-1 Modeling of Agile Intelligent Manufacturing-oriented Production Scheduling System Zhong-Qi
More informationA Practical Approach Using Decision Management and Decision Modeling at The Principal
Building Business Capability (BBC) 2013 A Practical Approach Using Decision Management and Decision Modeling at The Principal Doris Kimball and Don Perkins Welcome and Introduction Doris Kimball Senior
More informationDeveloping Connected Products - What s needed? Driven to enable your success!
Developing Connected Products - What s needed? Driven to enable your success! What s a Connected Product Smart, connected products are products, assets and other things embedded with processors, sensors,
More informationMOT Seminar. John Musacchio 4/16/09
Game Theory MOT Seminar John Musacchio johnm@soe.ucsc.edu 4/16/09 1 Who am I? John Musacchio Assistant Professor in ISTM Joined January 2005 PhD from Berkeley in Electrical l Engineering i Research Interests
More information